CMGT/441 Intro. to Information Systems Security Management

84
CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless Networks Philip Robbins – December 19, 2013

description

Week #4. CMGT/441 Intro. to Information Systems Security Management. Hacking Wireless Networks. Philip Robbins – December 19, 2013. Information Technology University of Phoenix Kapolei Learning Center. 1. Topics Understanding Wireless Technology & Standards Tools - PowerPoint PPT Presentation

Transcript of CMGT/441 Intro. to Information Systems Security Management

Page 1: CMGT/441 Intro. to Information Systems Security Management

CMGT/441 Intro. to Information Systems Security Management

Information TechnologyUniversity of Phoenix Kapolei Learning Center

Week #4

1

Hacking Wireless Networks

Philip Robbins – December 19, 2013

Page 2: CMGT/441 Intro. to Information Systems Security Management

2

Hacking Wireless Networks

Topics• Understanding Wireless Technology & Standards• Tools• Hacking WEP, WPA, WPA2• Uncovering SSIDs• Bypassing MAC Address Filtering• De-Authentication & Mis-Association• Review Q&A

• Quiz #4

Page 3: CMGT/441 Intro. to Information Systems Security Management

3

Page 4: CMGT/441 Intro. to Information Systems Security Management

4

Understanding Wireless Standards• IEEE 802.11– IEEE came up the 802.11 standard for wireless

ethernet.– OSI Layers 1 & 2– 79 channels, 2.4 to 2.4835 GHz (USA)– Half Duplex– CSMA/CA (Avoidance) v.s. CSMA/CD (Detection)– Modulation Techniques

Page 5: CMGT/441 Intro. to Information Systems Security Management

5

Understanding Wireless Standards– Center Frequency & Channels for 2.4 GHz

Page 6: CMGT/441 Intro. to Information Systems Security Management

6

Understanding Wireless Standards– 4 Way Handshake

Page 7: CMGT/441 Intro. to Information Systems Security Management

7

Understanding Wireless Standards– 802.11 Standards

Page 8: CMGT/441 Intro. to Information Systems Security Management

8

Page 9: CMGT/441 Intro. to Information Systems Security Management

9

Tools• Alfa AWUSO36H WiFi Network Adapter

Page 10: CMGT/441 Intro. to Information Systems Security Management

10

Tools• Alfa AWUSO36H WiFi Network Adapter

Page 11: CMGT/441 Intro. to Information Systems Security Management

11

Tools• Alfa AWUSO36H WiFi Network Adapter

30dBm = 1W

Page 12: CMGT/441 Intro. to Information Systems Security Management

12

Tools• Netgear Wireless Router

Page 13: CMGT/441 Intro. to Information Systems Security Management

13

Tools• Netgear Wireless Router

TARGET AP

Page 14: CMGT/441 Intro. to Information Systems Security Management

14

Tools• Netgear Wireless Router

TARGET

192.168.1.1

Page 15: CMGT/441 Intro. to Information Systems Security Management

15

Tools / Configuration

“password”

Page 16: CMGT/441 Intro. to Information Systems Security Management

16

Tools / Configuration

Forgot the password for your router? …or your neighbors?

Page 17: CMGT/441 Intro. to Information Systems Security Management

17

Tools / Configuration

“password”

WEP CONFIGURATION

Page 18: CMGT/441 Intro. to Information Systems Security Management

18

Tools / Configuration

Page 19: CMGT/441 Intro. to Information Systems Security Management

19

Tools / Configuration

Authentication?

Page 20: CMGT/441 Intro. to Information Systems Security Management

20

Tools / Configuration

WPA CONFIGURATION

Page 21: CMGT/441 Intro. to Information Systems Security Management

21

Tools / Configuration

Page 22: CMGT/441 Intro. to Information Systems Security Management

22

Tools / Configuration

“password”

Page 23: CMGT/441 Intro. to Information Systems Security Management

23

ToolsBacktrack 5r3Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics andpen testing use.

http://www.backtrack-linux.org/downloads/

1

2 3

4…

Page 24: CMGT/441 Intro. to Information Systems Security Management

24

Tools

Page 25: CMGT/441 Intro. to Information Systems Security Management

25

Tools

Page 26: CMGT/441 Intro. to Information Systems Security Management

26

Tools

Page 27: CMGT/441 Intro. to Information Systems Security Management

27

Tools

Page 28: CMGT/441 Intro. to Information Systems Security Management

28

Tools

AirSnort replacement.

Page 29: CMGT/441 Intro. to Information Systems Security Management

29

Understanding Wireless Technology• Wi-Fi Protected Access (WPA)– Touted as a step up from WEP– Weak passphrases renders the protection inadequate– False sense of security– Network Sniffers– TKIP v.s. AES

Page 30: CMGT/441 Intro. to Information Systems Security Management

30

Cracking WPA

Page 31: CMGT/441 Intro. to Information Systems Security Management

31

Cracking WPA

Page 32: CMGT/441 Intro. to Information Systems Security Management

32

Cracking WPA

Page 33: CMGT/441 Intro. to Information Systems Security Management

33

r

Cracking WPA

Page 34: CMGT/441 Intro. to Information Systems Security Management

34

r

Cracking WPA

Page 35: CMGT/441 Intro. to Information Systems Security Management

35

Cracking WPA

Page 36: CMGT/441 Intro. to Information Systems Security Management

36

r

Cracking WPA

Page 37: CMGT/441 Intro. to Information Systems Security Management

37

r

Cracking WPA

Page 38: CMGT/441 Intro. to Information Systems Security Management

38

Cracking WPA

Page 39: CMGT/441 Intro. to Information Systems Security Management

39

r

Cracking WPA

Page 40: CMGT/441 Intro. to Information Systems Security Management

40

r

Cracking WPA

Page 41: CMGT/441 Intro. to Information Systems Security Management

41

Cracking WPA

Page 42: CMGT/441 Intro. to Information Systems Security Management

42

Cracking WPA

Page 43: CMGT/441 Intro. to Information Systems Security Management

43

Cracking WPA

Can take a few hours to gothrough 1+ million keys…

Page 44: CMGT/441 Intro. to Information Systems Security Management

44

Cracking WPA

Page 45: CMGT/441 Intro. to Information Systems Security Management

45

Cracking WPA

Page 46: CMGT/441 Intro. to Information Systems Security Management

46

Understanding Wireless Technology• Wired Equivalent Privacy (WEP)

Page 47: CMGT/441 Intro. to Information Systems Security Management

47

Understanding Wireless Technology• Wired Equivalent Privacy (WEP)– Confidentiality– Access Control– Data Integrity

– In reality, none of these are actually enforced!

Page 48: CMGT/441 Intro. to Information Systems Security Management

48

Understanding Wireless Technology• Wired Equivalent Privacy (WEP)

Stream Cipher using XOR

Keystream

64-bit Keyspace (2^64 keys)128-bit Keyspace (2^128 keys)

40 bits 24 bits

Page 49: CMGT/441 Intro. to Information Systems Security Management

49

Understanding Wireless Technology• Wired Equivalent Privacy (WEP)

Page 50: CMGT/441 Intro. to Information Systems Security Management

50

Understanding Wireless Technology• Wired Equivalent Privacy (WEP)

Page 51: CMGT/441 Intro. to Information Systems Security Management

51

Understanding Wireless Technology• Wired Equivalent Privacy

Page 52: CMGT/441 Intro. to Information Systems Security Management

52

Cracking WEP

Page 53: CMGT/441 Intro. to Information Systems Security Management

53

Cracking WEP

Page 54: CMGT/441 Intro. to Information Systems Security Management

54

Cracking WEP

Page 55: CMGT/441 Intro. to Information Systems Security Management

55

Cracking WEP

Page 56: CMGT/441 Intro. to Information Systems Security Management

56

Cracking WEP

Page 57: CMGT/441 Intro. to Information Systems Security Management

57

Cracking WEP

Page 58: CMGT/441 Intro. to Information Systems Security Management

58

Cracking WEP

1

2

3

Page 59: CMGT/441 Intro. to Information Systems Security Management

59

Bypassing MAC filtering

Page 60: CMGT/441 Intro. to Information Systems Security Management

60

Review Questions• Question #1

Which IEEE standard defines authentication and authorization in wireless networks?

a. 802.11b. 802.11ac. 802.11bd. 802.11X

Page 61: CMGT/441 Intro. to Information Systems Security Management

61

Review Questions• Question #1

Which IEEE standard defines authentication and authorization in wireless networks?

a. 802.11b. 802.11ac. 802.11bd. 802.11X

Page 62: CMGT/441 Intro. to Information Systems Security Management

62

Review Questions• Question #2

Which IEEE standard defines wireless technology?

a. 802.3b. 802.5c. 802.11d. All 802 standards

Page 63: CMGT/441 Intro. to Information Systems Security Management

63

Review Questions• Question #2

Which IEEE standard defines wireless technology?

a. 802.3b. 802.5c. 802.11d. All 802 standards

Page 64: CMGT/441 Intro. to Information Systems Security Management

64

Review Questions• Question #3

Which wireless encryption standard offers the best security?

a. WPA2b. WEPc. SSLd. WPA

Page 65: CMGT/441 Intro. to Information Systems Security Management

65

Review Questions• Question #3

Which wireless encryption standard offers the best security?

a. WPA2b. WEPc. SSLd. WPA

Page 66: CMGT/441 Intro. to Information Systems Security Management

66

Review Questions• Question #4

What information can be gathered by wardriving?

a. SSIDs of wireless networksb. Whether encryption is enabledc. Whether SSL is enabledd. Signal strength

Page 67: CMGT/441 Intro. to Information Systems Security Management

67

Review Questions• Question #4

What information can be gathered by wardriving?

a. SSIDs of wireless networksb. Whether encryption is enabledc. Whether SSL is enabledd. Signal strength

Page 68: CMGT/441 Intro. to Information Systems Security Management

68

Review Questions• Question #5

What is a known weakness of wireless SSIDs?

a. They’re broadcast in cleartextb. They’re difficult to configurec. They use large amounts of bandwidthd. They consume an excessive amount of computer memory

Page 69: CMGT/441 Intro. to Information Systems Security Management

69

Review Questions• Question #5

What is a known weakness of wireless SSIDs?

a. They’re broadcast in cleartextb. They’re difficult to configurec. They use large amounts of bandwidthd. They consume an excessive amount of computer memory

Page 70: CMGT/441 Intro. to Information Systems Security Management

70

Review Questions• Question #6

Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard?

a. 802.11ab. 802.11bc. 802.11id. 802.11

Page 71: CMGT/441 Intro. to Information Systems Security Management

71

Review Questions• Question #6

Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard?

a. 802.11ab. 802.11bc. 802.11id. 802.11

Page 72: CMGT/441 Intro. to Information Systems Security Management

72

Review Questions• Question #7

What protocol was added to 802.11i to address WEP’s encryption vulnerability?

a. MICb. TKIPc. TTLd. EAP-TLS

Page 73: CMGT/441 Intro. to Information Systems Security Management

73

Review Questions• Question #7

What protocol was added to 802.11i to address WEP’s encryption vulnerability?

a. MICb. TKIPc. TTLd. EAP-TLS

Page 74: CMGT/441 Intro. to Information Systems Security Management

74

Review Questions• Question #8

Disabling SSID broadcasts must be configured on the computer and the AP. True or False?

a. TRUEb. FALSE

Page 75: CMGT/441 Intro. to Information Systems Security Management

75

Review Questions• Question #8

Disabling SSID broadcasts must be configured on the computer and the AP. True or False?

a. TRUEb. FALSE

Page 76: CMGT/441 Intro. to Information Systems Security Management

76

Review Questions• Question #9

The operating frequency range of 802.11a is 2.4 GHZ. True or False?

a. TRUEb. FALSE

Page 77: CMGT/441 Intro. to Information Systems Security Management

77

Review Questions• Question #9

The operating frequency range of 802.11a is 2.4 GHZ. True or False?

a. TRUEb. FALSE

Page 78: CMGT/441 Intro. to Information Systems Security Management

78

Review Questions• Question #10

What TKIP enhancement addressed the WEP vulnerability of forging packets?

a. Extended Initialization Vector (IV) with sequencing rulesb. Per-packet key mixingc. Rekeying mechanismd. Message Integrity Check (MIC)

Page 79: CMGT/441 Intro. to Information Systems Security Management

79

Review Questions• Question #10

What TKIP enhancement addressed the WEP vulnerability of forging packets?

a. Extended Initialization Vector (IV) with sequencing rulesb. Per-packet key mixingc. Rekeying mechanismd. Message Integrity Check (MIC)

Page 80: CMGT/441 Intro. to Information Systems Security Management

80

Review Questions• Question #11

Which EAP method requires installing digital certificates on both the server and client?

a. EAP-TLSb. PEAPc. EAP-SSLd. EAP-CA

Page 81: CMGT/441 Intro. to Information Systems Security Management

81

Review Questions• Question #11

Which EAP method requires installing digital certificates on both the server and client?

a. EAP-TLSb. PEAPc. EAP-SSLd. EAP-CA

Page 82: CMGT/441 Intro. to Information Systems Security Management

82

Review Questions• Question #12 (last one)

Which spread spectrum method divides bandwidth into a series of frequencies called tones?

a. Frequency-hopping spread spectrum (FHSS)b. Direct sequence spread spectrum (DSSS)c. Spread spectrum frequency tonation (SSFT)d. Orthogonal frequency division multiplexing (OFDM)

Page 83: CMGT/441 Intro. to Information Systems Security Management

83

Review Questions• Question #12 (last one)

Which spread spectrum method divides bandwidth into a series of frequencies called tones?

a. Frequency-hopping spread spectrum (FHSS)b. Direct sequence spread spectrum (DSSS)c. Spread spectrum frequency tonation (SSFT)d. Orthogonal frequency division multiplexing (OFDM)

Page 84: CMGT/441 Intro. to Information Systems Security Management

84

Questions?

[email protected]/~probbinshttps://www.dorkatron.com/docs/CMGT441/